메뉴 건너뛰기




Volumn , Issue , 2007, Pages 190-197

Intrusion detection system for signal based SIP attacks through timed HCPN

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED DESIGN; COMPUTER CRIME; INTERNET PROTOCOLS; INTERNET TELEPHONY; MATHEMATICAL MODELS;

EID: 34548151350     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2007.102     Document Type: Conference Paper
Times cited : (18)

References (28)
  • 2
    • 0036870280 scopus 로고    scopus 로고
    • SIP Security Issues: The SIP Authentication Procedure and its Processing Load
    • November
    • S. Salsano, L. Veltri, and D. Papalilo. SIP Security Issues: The SIP Authentication Procedure and its Processing Load. In IEEE Networks, pages 38-44, November 2002.
    • (2002) IEEE Networks , pp. 38-44
    • Salsano, S.1    Veltri, L.2    Papalilo, D.3
  • 5
    • 34548187761 scopus 로고    scopus 로고
    • Mark D.Collier Session Initiation Protocol Vulnerabilities, IPCOMM 2006.
    • Mark D.Collier "Session Initiation Protocol Vulnerabilities", IPCOMM 2006.
  • 6
    • 70449570820 scopus 로고    scopus 로고
    • SIP Security Requirements
    • work in progress, Nov
    • M.Thomas, "SIP Security Requirements," IETF Internet draft, work in progress, Nov. 2001.
    • (2001) IETF Internet draft
    • Thomas, M.1
  • 7
    • 34548145155 scopus 로고    scopus 로고
    • Basic Vulnerability Issues for SIP Security
    • Mark Collier. "Basic Vulnerability Issues for SIP Security", Research Report, 2005
    • (2005) Research Report
    • Collier, M.1
  • 8
    • 77953069969 scopus 로고    scopus 로고
    • Abstracting Application-Level Web Security
    • ACM Press, New York, May
    • Scott D. and Sharp R., "Abstracting Application-Level Web Security," Proc. 11th Int'l World Wide Web Conf., ACM Press, New York, May 2002, pp. 396-407.
    • (2002) Proc. 11th Int'l World Wide Web Conf , pp. 396-407
    • Scott, D.1    Sharp, R.2
  • 9
    • 33947171900 scopus 로고    scopus 로고
    • A Novel Approach to Detection of Intrusions in Computer Networks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods
    • Sep
    • Alexander G Tartakovsky, "A Novel Approach to Detection of Intrusions in Computer Networks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods," IEEE transactions on signal processing. Vol.54 No.9, Sep 2006.
    • (2006) IEEE transactions on signal processing , vol.54 , Issue.9
    • Tartakovsky, A.G.1
  • 10
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • LISA
    • M.Roesch, "Snort: Lightweight intrusion detection for networks," In Proc. 13th Syst. Admin.Conf. (LISA), 1999, pp. 229-238.
    • (1999) Proc. 13th Syst. Admin.Conf , pp. 229-238
    • Roesch, M.1
  • 13
    • 0142095474 scopus 로고    scopus 로고
    • Using Artificial anomalies to detect Unknown and known network intrusions
    • Nov.-2 Dec, Pages
    • Wei Fan "Using Artificial anomalies to detect Unknown and known network intrusions," Proceedings IEEE International Conference on 29 Nov.-2 Dec. 2001 Page(s):123-130
    • (2001) Proceedings IEEE International Conference on 29 , pp. 123-130
    • Fan, W.1
  • 14
    • 34548183575 scopus 로고    scopus 로고
    • An Anomaly&Signature-based Intrusion Detection System Model
    • China, Sept
    • Frans David. "An Anomaly&Signature-based Intrusion Detection System Model", Computing Technology and Automation, China, Vol.23, No.3, Sept 2004
    • (2004) Computing Technology and Automation , vol.23 , Issue.3
    • David, F.1
  • 15
    • 0038323501 scopus 로고    scopus 로고
    • Live traffic analysis of TCP/IP gateways
    • San Diego, Mar
    • P. Porras and A. Valdes. "Live traffic analysis of TCP/IP gateways," In Proc. ISOC Symp. NDSS, San Diego, Mar. 1998.
    • (1998) Proc. ISOC Symp. NDSS
    • Porras, P.1    Valdes, A.2
  • 16
    • 34548168611 scopus 로고    scopus 로고
    • A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION
    • A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION
  • 17
    • 0027150412 scopus 로고
    • Ustat: A real-time intrusion detection system for Unix
    • Oakland, CA, May
    • K. Ilgun, "Ustat: A real-time intrusion detection system for Unix," in Proc. IEEE Symp. Res. Security Privacy, Oakland, CA, May 1993, pp. 16-28.
    • (1993) Proc. IEEE Symp. Res. Security Privacy , pp. 16-28
    • Ilgun, K.1
  • 18
    • 34548146084 scopus 로고    scopus 로고
    • VoIP Intrusion Detection Through Interacting Protocol State Machines Dependable Systems and Networks, 2006. DSN 2006
    • June
    • Sengar, H. "VoIP Intrusion Detection Through Interacting Protocol State Machines" Dependable Systems and Networks, 2006. DSN 2006. International Conference on 25-28 June 2006
    • (2006) International Conference on 25-28
    • Sengar, H.1
  • 19
    • 0038011179 scopus 로고    scopus 로고
    • Specification-based anomaly detection: A new approach for detecting network intrusions
    • CCS, Washington DC, November
    • R. Sekar, A. Gupta. Specification-based anomaly detection: A new approach for detecting network intrusions. In ACM Computer and Communication Security Conference (CCS), Washington DC, November 2002.
    • (2002) ACM Computer and Communication Security Conference
    • Sekar, R.1    Gupta, A.2
  • 21
    • 34548191551 scopus 로고    scopus 로고
    • Planning, Petri Nets, and Intrusion Detection
    • National Information Systems Security Conference
    • Deborah Frincke. "Planning, Petri Nets, and Intrusion Detection," 21st Proc. National Information Systems Security Conference.
    • 21st Proc
    • Frincke, D.1
  • 22
    • 0002028280 scopus 로고
    • A pattern matching model for misuse intrusion detection
    • Oct
    • S. Kumar and E. Spafford. "A pattern matching model for misuse intrusion detection," In Proc. 17th Nat. Comput Security Conf., Oct. 1994, pp. 11-21.
    • (1994) Proc. 17th Nat. Comput Security Conf , pp. 11-21
    • Kumar, S.1    Spafford, E.2
  • 24
    • 31044448292 scopus 로고    scopus 로고
    • Towards the automatic generation of mobile agents for distributed intrusion detection system
    • Yanxin Wang*. "Towards the automatic generation of mobile agents for distributed intrusion detection system," The Journal of Systems and Software 79 (2006) 1-14
    • (2006) The Journal of Systems and Software , vol.79 , pp. 1-14
    • Wang*, Y.1
  • 26
    • 15944385743 scopus 로고    scopus 로고
    • Hierarchical CPN model-based diagnosis using HAZOP knowledge
    • SCL-009/2003
    • E. Németh, "Hierarchical CPN model-based diagnosis using HAZOP knowledge," Research Report SCL-009/2003
    • Research Report
    • Németh, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.